MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d0d1cd4e935867d366c2e0e4b213c45919a6edbc4536eeb1637fa7eeda975a43. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: d0d1cd4e935867d366c2e0e4b213c45919a6edbc4536eeb1637fa7eeda975a43
SHA3-384 hash: 48d419c6c716e062b22176cf74508e413d13cdbff0c0d15060a3a92548e4215c926fd945b866945c991d48eb70685ff1
SHA1 hash: a72d6a0ea39d03841845b4e584b6aef883391151
MD5 hash: 0738edaa9bc982da1dfc7af8e58044bd
humanhash: yellow-nineteen-seven-alabama
File name:RFQ_2020.exe
Download: download sample
Signature GuLoader
File size:155'648 bytes
First seen:2020-05-12 15:49:25 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4d2f9aebdc36a1f139d2dd7a56c72f0a (1 x GuLoader)
ssdeep 768:+k8Ib2NhMDjhZX9geNN86hyVKGXAcq+VLUdH9Gllcd++lxEuzPkFI+H95hWGt8CV:++IMPpxk68NX5Yul+9xh+5YGtRf/
Threatray 785 similar samples on MalwareBazaar
TLSH 2CE3218CFBD68417EE128A3AC667BD140E3B6DB1195E41CF12F274028B73BA45E509BD
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: gium.com
Sending IP: 173.82.245.218
From: smith@bonnienkim.us
Reply-To: byron@cglhkgs.online
Subject: Re: Re: urgent request for quotation for Bid
Attachment: RFQ_2020.img (contains "RFQ_2020.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-13 01:54:26 UTC
AV detection:
23 of 31 (74.19%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

f6ca004124d8a4793b405761fc57abe4

GuLoader

Executable exe d0d1cd4e935867d366c2e0e4b213c45919a6edbc4536eeb1637fa7eeda975a43

(this sample)

  
Dropped by
MD5 f6ca004124d8a4793b405761fc57abe4
  
Delivery method
Distributed via e-mail attachment

Comments